CloudSploit

An open-source project called CloudSploit by Aqua enables the identification of security concerns in cloud infrastructure accounts, such as those for GitHub, Amazon Web Services (AWS), Microsoft Azure, Google Cloud Platform (GCP), and Oracle Cloud Infrastructure (OCI). These programmes provide a long list of possible security flaws and setup errors.

CloudSploit by Aqua is an open-source initiative aimed at enabling the identification of security vulnerabilities in cloud infrastructure accounts. It supports various cloud platforms, including Amazon Web Services (AWS), Microsoft Azure, Google Cloud Platform (GCP), Oracle Cloud Infrastructure (OCI), and GitHub. These scripts provide insights into potential misconfigurations and security risks within these cloud environments.

Installation

 

Credential Files

If you use the credential_file option, point to a file inyour file system that follows the correct format for the cloud you are using.

AWS

{

 "accessKeyId":"YOURACCESSKEY",

 "secretAccessKey":"YOURSECRETKEY"

}

Azure

{

"ApplicationID": "YOURAZUREAPPLICATIONID",

"KeyValue": "YOURAZUREKEYVALUE",

"DirectoryID": "YOURAZUREDIRECTORYID",

"SubscriptionID": "YOURAZURESUBSCRIPTIONID"

}

GCP

For GCP, you generate a JSON file directly from the GCPconsole, which you should not edit.

{

   "type":"service_account",

  "project": "GCPPROJECTNAME",

  "client_email": "GCPCLIENTEMAIL",

  "private_key": "GCPPRIVATEKEY"

}

Oracle OCI

{

"tenancyId": "YOURORACLETENANCYID",

"compartmentId": "YOURORACLECOMPARTMENTID",

 "userId":"YOURORACLEUSERID",

"keyFingerprint": "YOURORACLEKEYFINGERPRINT",

"keyValue": "YOURORACLEKEYVALUE"

}

Example of commands to use

Suppress all results for the acmValidation plugin

 

Suppress all us-east-1 regionresults

 

Suppress all results matching theregex "certificate/*" in all regions for all plugins

 

Screenshot of the work

Table of Contents: